13. Which one of the following indicates a crontab entry that specifies a task that will be run every 5 minutes, Monday through Friday?
*/5 * * * 1-5
*/5 * 1-5 * *
0/5 * * * 1-5
0/5 * 1-5 * *
The crontab entry that specifies a task that will be run every 5 minutes, Monday through Friday is `*/5 * * * 1-5`.
The cron daemon is a system process that is used to automatically run commands or scripts on a Unix/Linux system. Crontab, or cron table, is a configuration file used by the cron daemon to schedule tasks to run automatically at specified intervals.
Here is what each of the fields in a crontab entry means:
Minute: 0-59
Hour: 0-23
Day of the month: 1-31
Month: 1-12
Day of the week: 0-6 (0 is Sunday)
Therefore, the crontab entry that specifies a task that will be run every 5 minutes, Monday through Friday is `*/5 * * * 1-5`.
You can learn more about crontab entry at: brainly.com/question/28283066
#SPJ11
A few months ago, your friend started an online friendship with somebody she met on a forum about her favorite sports team. This person claims to be the same age and lives in a different city. Coincidentally, your friend’s family is going on vacation to the city where her Internet friend lives. Your friend tells you that she plans to meet her Internet friend in person.
What steps should you take to respond to this situation? by the way this is school not real life
Answer:
1. Ask someone to go with you, your other friend or an adult
2. You should find a meeting place that is out in the open
3. Try to make a group hangout
4. Have your phone on you
A(n) event is an action taken by the user or a process, such as a user clicking a mouse or pressing a key on a keyboard.
Answer:
The answer is event
Explanation:
Answer:
event
Explanation:
got it right on edge
Programming languages create codes that represent binary numbers so that programmers can write in a language closer to natural speech.
Answer:
True
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
This ultimately implies that, programming languages are designed and developed for creating codes that represent binary numbers (0s and 1s), so that programmers or software developers can write in a language closer to natural speech i.e the human language.
Write a program that hardcodes a proposed password and checks that it is an acceptable password.
If the proposed password is acceptable password, the program writes a message "Password zzzzzzzzz is acceptable" and ends.
If it is not acceptable, it writes a message "Password is acceptable because it "
Where
is the password which was checked.
is one of:
"is not at least 7 characters long."
"does not contain both upper and lower case alphabetic characters."
"does not contain at least 1 digit."
is used if the PW is not acceptable, else the word not isn't printed.
"is an acceptable password."
Acceptable passwords:
are at least 7 characters long.
contain both upper and lower case alphabetic characters.
contain at least 1 digit.
The logic of this program can be quite tricky. Hint: use toUpperCase(), toLowerCase, and equals(). You will also need nested ifs.
Here some sample runs of the program; your output should look substantially the same:
C:\>java PasswordChecker
Enter your password:
snowflake
Password snowflake is not acceptable because it does not contain both upper and lower case alphabetic characters."
Enter your password:
SnowFlake
Using the knowledge in computational language in JAVA it is possible to write the code that write a program that hardcodes a proposed password and checks that it is an acceptable password.
Writting the code:
class InvalidPasswordException extends Exception {
int passwordConditionViolated = 0;
public InvalidPasswordException(int conditionViolated)
{
super("Invalid Password: ");
passwordConditionViolated = conditionViolated;
}
public String printMessage()
{
switch (passwordConditionViolated) {
case 1:
return ("Password length should be"
+ " between 8 to 15 characters");
case 2:
return ("Password should not"
+ " contain any space");
case 3:
return ("Password should contain"
+ " at least one digit(0-9)");
case 4:
return ("Password should contain at "
+ "least one special character");
case 5:
return ("Password should contain at"
+ " least one uppercase letter(A-Z)");
case 6:
return ("Password should contain at"
+ " least one lowercase letter(a-z)");
}
return ("");
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
what is the essence of proper nutrition?
Answer:
Proper nutrition is about balance, and that means not getting too much of certain ingredients, such as sodium, or salt. Sodium increases blood pressure, which raises the risk of heart disease and stroke.
Explanation:
Answer:
Explanation:
Most people know good nutrition and physical activity can help maintain a healthy weight. But the benefits of good nutrition go beyond weight. Good nutrition can help: Reduce the risk of some diseases, including heart disease, diabetes, stroke, some cancers, and osteoporosis.
A bit pattern is shown below.
01001110
Convert the bit pattern into decimal
Answer:
78
Explanation:
I always convert to hexadecimal first:
0100 = 4
1110 = E
(the matching of groups of 4 bits to one hex char is a lookup you can memorize)
so we have 4E, which is 4*16+14 = 78
Of course you can also go the long route:
01001110 = 0·2⁷+1·2⁶+0·2⁵+0·2⁴+1·2³+1·2²+1·2¹+0·2⁰ = 78
Why do you think many Nepalese want to go abroad? Give some opinion.
Answer:
Due to lack of job opportunities
Due to income inequality
For improvement of living standard
to highly get paid
Some peer-to-peer networks have a server and some don't.
~True
OR
`False
Answer:
true
Explanation:
True because on peer-to-peer network the client computer act both as a server and workstation.
Answer:
True
Explanation:
Sean Cody is a website most known for what?
Answer:
Sean Cody is a website most known for to translate English to Portuguese.
in this question we explore how ssl/tls and pki protects or fails to protect against man-in-the-middle attacks in different scenarios
SSL/TLS and PKI provide protection against man-in-the-middle (MITM) attacks by encrypting the communication between a client and a server, and by verifying the identity of the server.
In a typical scenario, when a client connects to a server using SSL/TLS, the server presents its digital certificate, which is issued by a trusted Certificate Authority (CA).
The client verifies the authenticity of the certificate using the CA's public key, ensuring that it is communicating with the intended server and not an attacker.
The communication between the client and server is then encrypted using symmetric encryption keys, which are securely exchanged during the SSL/TLS handshake. This encryption prevents an attacker from intercepting and understanding the transmitted data.
However, there are scenarios where SSL/TLS and PKI can fail to protect against MITM attacks. One such scenario is when the client blindly trusts any certificate without proper validation.
If an attacker can present a fraudulent certificate that the client accepts without verification, they can intercept the communication between the client and server. Another scenario is when the CA's private key is compromised or when a CA is maliciously or negligently issuing fraudulent certificates.
In these cases, an attacker can obtain a valid certificate for their own malicious server, allowing them to intercept and manipulate the communication.
To know more about server click here
brainly.com/question/32113950
#SPJ11
Describe the three parts of a spreadsheet formula
Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and give several specific examples. How do you make sure your ideas are original and not copied directly from other video games? Explain.
Explain how the four game mechanics mentioned in the unit (reward, risk/loss, levels, and feedback) could work together to create an interesting sports video game.
You’ve learned that video games use rewards to keep players coming back for more. Can you think of an example in real life that uses rewards to keep people coming back for more? How is this similar to video game rewards? Explain.
The unit says this about levels: “As the levels get harder, the environment might also change, the music might get more intense, and the colors might change shades for a completely different mood.”
Imagine that you are working on a game, and with each level that they progress to, the player encounters a greater risk to their health and life. How would you alter the music, colors, and other aspects of the environment to reflect this risk? Describe and explain. Why do you feel these environment choices and changes reflect increasing risk?
When designing a video game, it is important to make sure that the game offers a balance of risk and reward to keep your players challenged but not frustrate them so much that they do not want to continue playing. How would you assess and test your game before completing it to ensure that you had the right balance of risk/reward? Is there any way to know that you have achieved that balance for every player?
PLZZZ HELP 50 POINTS AND BLAINLEST
Answer:
This is what I have so far
Designing a video game takes tons of creativity. What inspires your personal creativity and ideas for video games? Explain and give several specific examples. How do you make sure your ideas are original and not copied directly from other video games? Explain.
What inspires my personal creativity is all the indie games I have played in the past, and they have always amazed me with their design, video games have always been a part of me from the Mario games I played when I was little to AAA titles. My ideas are original because I’ve seen so much, that I know when something is unique and original.
Explain how the four-game mechanics mentioned in the unit (reward, risk/loss, levels, and feedback) could work together to create an interesting sports video game.
Every 10 levels is a new sport and each level is harder, but at the end of each level you earn money to buy better gear, (like a system from simple rpg,) but if you lose, you also lose money. Also, you would need to use feedback that you would get from players to improve the game.
You’ve learned that video games use rewards to keep players coming back for more. Can you think of an example in real life that uses rewards to keep people coming back for more? How is this similar to video game rewards? Explain.
When a person works 1 job for many years, they may get burnt out, but if they get a raise or a promotion every once and awhile, then they will be more motivated and come back for more. This is similar to games in a few ways, like if you play a single game for years, it will get boring, but if that game receives an update, then it will motivate people to play.
a technician wishes to deploy windows 10 pro to multiple pcs through the remote network installation process. the technician begins by connecting the new pcs to the network and booting them up. however, the deployment fails because the target pcs are unable to communicate with the deployment server. what is the possible cause?
Answer:
There are several possible causes for the deployment failure in this scenario:
Network connectivity issues: One possible cause is that there are network connectivity issues preventing the target PCs from communicating with the deployment server. The technician should check the network cables and switches, as well as the network settings on the target PCs and the deployment server, to ensure that they are properly configured and functioning correctly.Firewall or security software: Another possible cause is that the firewall or security software on the target PCs or the deployment server is blocking the communication. The technician should check the firewall settings and any security software on both the target PCs and the deployment server, and ensure that they are properly configured to allow communication.Incorrect deployment server configuration: It is also possible that the deployment server is not properly configured for the deployment. The technician should check the deployment server settings and ensure that it is set up correctly for the remote installation process.Hardware or software issues: Finally, hardware or software issues on the target PCs or the deployment server could also cause the deployment failure. The technician should check for any hardware or software issues on both the target PCs and the deployment server, and resolve any issues that are found.By identifying and addressing the root cause of the communication failure, the technician should be able to successfully deploy Windows 10 Pro to the target PCs through the remote network installation process.
Explanation:
A technician wishes to deploy Windows 10 Pro to multiple pcs through the remote network installation process. The possible cause is the NIC cards on the new PCs are not PXE-enabled.
What is a deployment failing?Network connectivity problems: One potential reason is that the target PCs are unable to connect to the deployment server due to network connectivity problems. The network cables, switches, target PCs, and deployment server settings should all be examined by the expert to make sure everything is configured and working properly.
Firewall or security software: The firewall or security software on the target computers or the deployment server could also be the issue. On both the target PCs and the deployment server, the technician should examine the firewall configurations and any security software to make sure they are set up correctly to allow communication.
Therefore, a technician wants to use the remote network installation technique to distribute Windows 10 Pro to several computers. The new PCs' NIC cards not supporting PXE could be the issue.
To learn more about technician, refer to the link:
https://brainly.com/question/13194741
#SPJ2
Web services that help people meet, interact, and share content with other people online are called ____________.
Web services that help individuals meet, interact, and share content with other individuals online are called social networking services.
A social networking service or SNS is an online platform that people use to build social relationships or social networks with other people who share similar interests, content, activities, backgrounds, or real-life connections. People who use social networking services create a profile with personal information and photo and build connections with other profiles.
Popular social networking sites are Fa-cebook, Tw-itter, Ins-tagram, and TikTok. These sites enable people to maintain social connections, stay informed, as well as access and share a wealth of information.
You can learn more about social networking service at
https://brainly.com/question/21106318
#SPJ4
Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and how would those questions affect your recommendation?
Answer:
I would ask her: One, how large will the business be? Two, how secure she wants/needs the connection to be. And three, how much money she is willing to spend to install and/or maintain her network.
Since Kayla is just starting her business, my recommendation would be to set up her network as a LAN. A LAN is a group of computers and network devices connected together, and most often reside in one building. Kayla's business will start small, so it is not needed to set up her network as a WAN. WAN's are usually not restricted to a geographical location, and can be expanded to cover a whole country, or even a planet. A LAN would make sense in the coverage aspect, since Kayla's business has not expanded yet.
Depending on how secure she wants her network to be, she can choose whether or not she uses WAN or LAN. WAN is less secure, as it covers a large geographical area, while LAN is more secure. LAN is more secure because it covers a smaller area. I would recommend using LAN as it is better to have a secure network as a business.
Finally, Kayla needs to address the cost of setting up and maintaining a LAN or WAN. I would recommend that Kayla uses a LAN because as a starting business, it is important to allocate money properly. LAN's usually cost less to install and maintain due to it's smaller geographical radius, so it would be best to choose to set up her network as a LAN.
Explanation:
(True/False) Binary Search on a sorted linked list has big O running time of O(log n)?
It is True that Binary Search on a sorted linked list has a big O running time of O(log n) because binary search divides the input data into two halves at every step.
As the linked list is already sorted, we can easily eliminate half of the remaining nodes at each step, which reduces the number of nodes we need to search through. This results in a time complexity of O(log n) for binary search on a sorted linked list.
However, it is worth noting that binary search is not the most efficient algorithm to use on a linked list as it requires random access to elements, which is not efficient in a linked list. Other search algorithms, such as linear search or interpolation search, might be more efficient for linked lists.
Learn more about Binary Search:https://brainly.com/question/15190740
#SPJ11
Which of these is a standard for describing a wifi network?
4G
802.11ac
100BaseT
mesh
Answer:
4g
Explanation:
i say 4g because its a standard for describing a wifi network.
Answer:802.11ac
Explanation:for me on k12 its 802.11ac not 4g
Which science fiction author was born in the 1800s?
Frank Herbert, Robert Heinlein, Edgar Rice Burroughs, Isaac Asimov
Answer:
Edgar Rice Burroughs, known for his work in Science Fiction and Fantasy, was born in the 1800s.
Explanation:
Other Choices:
Frank Herbert was also a known Science Fiction writer, but he wasn't born until 1920.
Robert Heinlein was born in 1907 and also a well-published Science Fiction author and military officer.
Isaac Asimov, much like Frank Herbert, wasn't born until 1920 and contributed to the same field of literature.
My study background is business. I am doing a bachelor of business administration. My major course is management information of the system. But I want to do data science. I know the journey is typically hard for me. In future , it will be demandable if I do data science in master's . Have I made a good decision?
Answer:
Yes,I think your going on right path! Keep up the hard work ! You got this!
Earning enough money to take a vacation is which rewards of work factor
Answer:
work content
Explanation:
i got this right
Answer: d
Explanation:
maria is writing a policy that defines her organization's data classification standard. the policy designates the it assets that are critical to the organization's mission and defines the organization's systems, uses, and data priorities. it also identifies assets within the seven domains of a typical it infrastructure. which policy is maria writing?
Based on the above description, the policy that maria is known to have been writing is said to be Asset classification policy.
What is the meaning of Asset classification policy?The term known as Asset classification policy is known to be a kind of a policy that is said to be used to state out all of a firm or an organization's data classification standard.
Note that it is one that often informs us what the information Technology assets are as they are known to be critical to the organization's mission.
The use of policy is one that helps in guiding the day to day running of any business.
Therefore, It helps us to be able to state the organization's systems, uses, as well as data priorities and as such, based on the above description, the policy that maria is known to have been writing is said to be Asset classification policy.
Learn more about Asset classification policy from
https://brainly.com/question/5581152
#SPJ1
Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?
Hand coding
Line coding
Planning & Analysis
Sequencing
Answer:
Sequencing
Explanation:
I have taken the test
Which of the following is not a characteristic of a System?
(A) System compromises of mutually related & cooperating elements.
(B) System may contain several subsystems with sub goals, all contributing to meeting the overall system goal.
(C) Five components of a generic system include Input, Process, Output, Feedback and Control.
(D) In systems, information is used as the input for a process that creates data as an output.
In systems, information is used as the input for a process that creates data as an output. This is not a characteristic of a system, but rather a description of how systems work.
What is systems?Systems are organized sets of components that interact to achieve a common goal or purpose. Systems can be physical, such as the human body, or they can be abstract, such as a computer system. Systems can also be mechanical, electrical, biological, or chemical. Each system is composed of various elements that are interconnected and interact with each other in order to accomplish a task.
Systems typically have inputs, processes, outputs, feedback, and control features that allow them to function and meet their goals.
To learn more about systems
https://brainly.com/question/12947584
#SPJ4
1)write a python program to check wheter the given number is even or odd
2) write a python program to add any 5 subjects makrs, find sum and average (average=sum/5)
3)write a python program to print numbers from 1 to 100 using loops
Answer:
n = 16
if n%2:
print('{} is odd'.format(n))
else:
print('{} is even'.format(n))
m1 = 5
m2 = 4
m3 = 6
m4 = 8
m5 = 9
sum = m1+m2+m3+m4+m5
average = sum/5
print("The sum is {}, the average is {}". format(sum, average))
for i in range(1, 101): print(i, end=",")
Explanation:
Above program does all three tasks.
Answer:
1) num1 = int(input("Enter the number to be checked: "))
if num1%2==0:
print("Your number is an even number!")
else:
print("Your number is not even!")
2) maths = int(input("Enter your maths mark: "))
english = int(input("Enter your english mark: "))
social = int(input("Enter your social mark: "))
science = int(input("Enter your science mark: "))
computer = int(input("Enter your computer mark: "))
Sum = maths + english + social + science + computer
average = Sum / 5
print("Sum of your marks are:",Sum)
print("average of your marks are:",average)
3) num = 0
while num <= 99:
num+=1
print(num)
Explanation:
Welcome.
Pseudocode to java
Can you write this in Java program
Binary Search
Answer:
class Main {
public static void main(String[] args) {
int[] values = {11,12,15,16,112,118,123,145};
int target = 15;
int min = 0;
int high = values.length-1;
boolean found = false;
int answer = 0;
int mid;
while(!found && min <= high) {
mid = (min + high) / 2;
if (values[mid] == target) {
found = true;
answer = mid;
} else if (target > values[mid]) {
min = mid + 1;
} else {
high = mid - 1;
}
}
if (found) {
System.out.printf("%d FOUND AT ARRAY INDEX %d", target, answer);
} else {
System.out.printf("%d was not found", target);
}
}
}
Explanation:
I altered the while expression to make the code work.
Answer: class Main {
public static void main(String[] args) {
int[] values = {11,12,15,16,112,118,123,145};
int target = 15;
int min = 0;
int high = values.length-1;
boolean found = false;
int answer = 0;
int mid;
while(!found && min <= high) {
mid = (min + high) / 2;
if (values[mid] == target) {
found = true;
answer = mid;
} else if (target > values[mid]) {
min = mid + 1;
} else {
high = mid - 1;
}
}
if (found) {
System.out.printf("%d FOUND AT ARRAY INDEX %d", target, answer);
} else {
System.out.printf("%d was not found", target);
}
}
}
Explanation:
I altered the while expression to make the code work.
Which of these hardware components can you use to store videos? A. External RAM B. Floppy disk. C. Hard drive. D. Motherboard..
The hard drive (hardware) is used to store videos.
What is the use of Hard Ware?
A computer's hard drive is a type of storage device used to keep data. It is in charge of maintaining your operating system data, documents, music, videos, photographs, and preference files. You risk losing all of your important data if the hard drive malfunctions or is damaged. Most individuals utilize a backup solution that maintains a separate document file of the originals to avoid a data loss situation.
An electromagnetic head is used to write and read data to and from the rotating platters. This head hovers just above the rotating platters and glides over them. Without removing the hard drive's cover, it is impossible to observe this process while it is in progress. However, if a hard drive's cover is taken off to reveal the platters, the drive gets corrupted and is soon rendered useless. Data recovery is therefore carried out in controlled settings that are free of dust and other impurities that could harm the platters.
To know more about Hardware, Check out:
https://brainly.com/question/24370161
#SPJ4
.
Description For your example project, choose from this list of the most influential projects. To create the following, a: 1. Staffing management plan. 2. RACI chart. 3. Schedule with resource assignme
In the example project, you need to develop a staffing management plan to allocate resources effectively, create a RACI chart for clear roles and responsibilities, and establish a schedule with resource assignments for timely task completion.
In the example project, you will need to develop a staffing management plan, which outlines how the project team will be structured, roles and responsibilities, and resource allocation. This plan ensures that the right people are assigned to the project and have the necessary skills.
A RACI chart is a tool that helps clarify roles and responsibilities by identifying who is Responsible, Accountable, Consulted, and Informed for each task or decision in the project. It helps prevent confusion and ensures clear communication and accountability among team members.
The schedule with resource assignments is a timeline that outlines the project tasks and their dependencies, along with the allocation of specific resources to each task. This schedule ensures that resources, such as people, equipment, or materials, are allocated efficiently and that tasks are completed within the project's timeframe.
By creating these deliverables, you establish a solid foundation for effective project management, ensuring that the right people are involved, roles are defined, and tasks are scheduled appropriately to achieve project success.
learn more about RACI chart here: brainly.com/question/32940947
#SPJ11
Write a function that takes in a parameter, squares it, and then prints the results. Squaring a number means multiplying it by itself. Then make several calls to that function in your start function to test it out. Does it
work for all arguments?
this is what i have so far but when i check the code it says “you should call your function square with some parameters. call your function at least twice” what am i doing wrong?
Answer:
are you looking answer like this?
def square(x):
return x * x
def start():
print(square(2))
print(square(3))
print(square(4))
print(square(5))
start()
The PC, IR, MAR, and MDR are written in various phases of the instruction cycle, depending on the opcode of the particular instruction. Suppose the instruction involved is an LDR instruction. In which phases is the PC register written to
The PC register is written to during the fetch phase of the instruction cycle when an LDR instruction is being executed.
During the fetch phase, the PC register holds the address of the next instruction to be executed. When an LDR instruction is being executed, the PC register is used to fetch the memory location of the operand being loaded into a register.
The instruction cycle consists of multiple phases, such as Fetch, Decode, Execute, and Store. When executing an LDR instruction, the PC register is written to during the Fetch phase. In this phase, the CPU fetches the instruction from memory, and the PC register is incremented to point to the next instruction.
To know more about LDR instruction visit:-
https://brainly.com/question/31145591
#SPJ11